• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Audit Identifies Security Gaps 3 Weeks Before Historic Breach

Time is of the essence when it comes to plugging gaps in your IT security. Just ask Premera Blue Cross. Last spring, federal auditors combed through Premera’s systems and uncovered a number of shortcomings. Flash forward three weeks: the issues hadn’t been addressed and hackers took advantage, potentially gaining access to the personal, financial and medical information of 11 million customers. That makes it the second largest healthcare data breach in history.

According to reports, hackers got into Premera’s system on May 5, 2014 and they went undetected until Jan. 29 of this year. Three weeks before the attack began, on April 18, Premera received a report from the U.S. Office of Personnel Management’s Office of the Inspector General outlining several vulnerabilities, including:

  • Patches were being implemented, just not in a timely manner
  • Methodology was missing to prevent unsupported or out-of-date software from being utilized
  • Server configurations were identified as not being secure by a vulnerability scan

Auditors listed a number of fixes they recommended that Premera make in order to bring its security environment up to the level it needed to be. These recommendations included:

  • Reconfiguring its information systems to ensure compliance with its password policy
  • Implementing procedures to ensure timely application of appropriate patches, service packs, and hotfixes to production servers
  • Remediating the technical weaknesses detailed in the vulnerability scanning audit inquiry issued during the audit
  • Routinely auditing all security configuration settings to keep them in compliance with the approved baseline
  • Subjecting all apps to routine disaster recovery testing

Premera promised to address the auditors’ concerns by Dec. 31, 2014. Of course, by that point it was already too late. Hackers had already had access to Premera’s systems for about eight months. A multi-state investigation into the breach is currently taking place.

A number of the items on the Feds’ punch list – including implementing updates and fixes on time and auditing security settings – should be standing items on IT’s calendar. However, they can also be among the first things dropped when IT gets overwhelmed with a number of other, more pressing projects.

That’s where Arraya’s Managed Services can help. Arraya’s team can take a wide range of tasks – from routine maintenance to more higher value items – off your IT team’s plate.

A Managed Services partnership with Arraya can result in simpler IT operations, a reduction in business disruptions and the peace of mind that comes with knowing someone has eyes 24/7 on the infrastructure services that support your business. Arraya’s experts are ready to work with your existing staff to chase down alerts, address issues, solve complex problems and manage requests across the full scope of your IT environment.   

Want to learn more about Arraya’s line of Managed Services? Reach out to your Arraya Account Executive, who can set up a meeting with our Managed Services team to evaluate your needs.  Not sure who your Account Executive is or looking to partner with Arraya for the first time?  Simply send us an email at info@arrayasolutions.com or contact us through our company website: www.arrayasolutions.com.

 If you want to learn about Arraya’s Managed Services and the latest cutting-edge offerings from industry-leading technology providers, register for The 2015 Arraya Tech Summit.

This free event will be held on June 4th, 2015 at the Sheraton Valley Forge in King of Prussia. It features courses geared specifically toward a tech-savvy audience, presented by Arraya’s renowned team of engineers. Attendees will have the opportunity to participate in deep-level technical discussions that focus on the issues and tools that matter most to today’s IT professionals. The lessons and skills you and your team will walk away with can propel IT to a whole new level, enabling the rest of the business to follow suit.

And don’t forget to follow us on Twitter, @ArrayaSolutions, for all of our latest company and Tech Summit news and offerings.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}